Jump to content

Covert operation: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Rescuing 3 sources and tagging 0 as dead. #IABot (v1.5beta)
Line 69: Line 69:


==External links==
==External links==
* [http://www.defencejournal.com/2000/feb/raw.htm ''RAW and Bangladesh'']
* [http://www.defencejournal.com/2000/feb/raw.htm ''RAW and Bangladesh'']
* [http://thewall.civiblog.org/rsf/hershstmt12006.html Richard Hersh Statement to House Judiciary Democratic Congressional Briefing], 20 January 2006 (HTML) via thewall.civiblog.org
* [http://thewall.civiblog.org/rsf/hershstmt12006.html Richard Hersh Statement to House Judiciary Democratic Congressional Briefing], 20 January 2006 (HTML) via thewall.civiblog.org
* [http://thewall.civiblog.org/rsf/nsabrieftranscript12006.html Full Transcript, House Judiciary Democratic Membership Briefing "Constitution in Crisis: Domestic Surveillance and Executive Power"] 20 January 2006 (HTML) via thewall.civiblog.org
* [http://thewall.civiblog.org/rsf/nsabrieftranscript12006.html Full Transcript, House Judiciary Democratic Membership Briefing "Constitution in Crisis: Domestic Surveillance and Executive Power"] 20 January 2006 (HTML) via thewall.civiblog.org
* [https://web.archive.org/web/20070707201837/http://thewall.civiblog.org/rsf/big_brother_talons_on_you.html "Big Brother is Watching You Part 1 - 902 MI Group TALON Project Summary, Spreadsheet, Rep. Wexler response, and News Coverage collection] (includes Shane Harris's "TIA Lives On") via thewall.civiblog.org
* [https://web.archive.org/web/20070707201837/http://thewall.civiblog.org/rsf/big_brother_talons_on_you.html "Big Brother is Watching You Part 1 - 902 MI Group TALON Project Summary, Spreadsheet, Rep. Wexler response, and News Coverage collection] (includes Shane Harris's "TIA Lives On") via thewall.civiblog.org
* [http://snoc.shacknet.nu/ Steath Network Operations Centre] – Covert Communication Support System
* [http://snoc.shacknet.nu/ Steath Network Operations Centre] – Covert Communication Support System

Revision as of 22:51, 13 August 2017

According to the U.S. Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is "an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor." It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas affecting either the internal population of a country or individuals outside of it. Covert operations aim to secretly fulfill their mission objectives without any parties knowing who sponsored or carried out the operation.

Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the Congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action.[1] The CIA's authority to conduct covert action comes from the National Security Act of 1947.[2] President Ronald Reagan issued Executive Order 12333 titled United States Intelligence Activities in 1984. This order defined covert action as "special activities", both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e).[2][3] The CIA must have a "Presidential Finding" issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[1] These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives.[4] As a result of this framework, the CIA "receives more oversight from the Congress than any other agency in the federal government".[5] The Special Activities Division (SAD) is a division of the CIA's National Clandestine Service, responsible for Covert Action and "Special Activities". These special activities include covert political influence and paramilitary operations.

Law enforcement

Undercover operations (such as sting operations or infiltration of organized crime groups) are conducted by law enforcement agencies to deter and detect crime and to gather information for future arrest and prosecution.

Military intelligence and foreign policy

Covert operations and clandestine operations are distinct. The Department of Defense Dictionary of Military and Associated Terms (Joint Publication JP1-02), defines "covert operation" as "an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor. A covert operation differs from a clandestine operation in that emphasis is placed on concealment of identity of sponsor rather than on concealment of the operation." The United States Department of Defense definition has been used by the United States and NATO since World War II.

In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden," while covert means "deniable." The term stealth refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of technologies (stealth technology) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions.

Covert operations are employed in situations where openly operating against a target would be disadvantageous. These operations are generally illegal in the target state and are frequently in violation of the laws of the sponsoring country. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d'état, or support for subversion. Tactics include the use of a false flag or front group.

The activity of organizations engaged in covert operations is in some instances similar to, or overlaps with, the activity of front organizations. While covert organizations are generally of a more official military or paramilitary nature, like the DVS German Air Transport School in the Nazi era, the line between both becomes muddled in the case of front organizations engaged in terrorist activities and organized crime.

Examples

Covert operations have often been the subject of popular novels, films (Zero Dark Thirty, Argo, The Falcon and The Snowman, The Kremlin Letter), TV series, comics, etc. The Company is a fictional covert organization featured in the American television drama/thriller series Prison Break. Also other series that deal with covert operations are Mission: Impossible, Alias, Burn Notice, The Unit, The State Within, Covert Affairs, Air Wolf, 24, The Blacklist, and the Strike Back series.

See also

References

  1. ^ a b Executive Secrets: Coved the Presidency, William J. Daugherty, University of Kentucky Press, 2004, page 25.
  2. ^ a b Executive Secrets: Covert Action and the Presidency, William J. Daugherty, University of Kentucky Press, 2004.
  3. ^ All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces, Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7
  4. ^ Daugherty, 2004, page 28.
  5. ^ Daugherty, 2004, page 29.

Further reading